Follow
Salvatore Stolfo
Salvatore Stolfo
Professor of Computer Science, Columbia University
Verified email at columbia.edu - Homepage
Title
Cited by
Cited by
Year
Data mining approaches for intrusion detection
W Lee, S Stolfo
21701998
A data mining framework for building intrusion detection models
W Lee, SJ Stolfo, KW Mok
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
20231999
Data mining methods for detection of new malicious executables
MG Schultz, E Eskin, F Zadok, SJ Stolfo
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 38-49, 2000
16452000
Intrusion Detection with unlabeled data using clustering
L Portnoy, E Eskin, SJ Stolfo
ACM CCS Workshop on Management of Data, 2001
14512001
Distributed data mining in credit card fraud detection
PK Chan, W Fan, AL Prodromidis, SJ Stolfo
IEEE Intelligent Systems and Their Applications 14 (6), 67-74, 1999
14441999
Real-world data is dirty: Data cleansing and the merge/purge problem
MA Hernández, SJ Stolfo
Data mining and knowledge discovery 2, 9-37, 1998
14291998
The merge/purge problem for large databases
MA Hernández, SJ Stolfo
ACM Sigmod Record 24 (2), 127-138, 1995
14181995
Anomalous payload-based network intrusion detection
K Wang, SJ Stolfo
International workshop on recent advances in intrusion detection, 203-222, 2004
13152004
A framework for constructing features and models for intrusion detection systems
W Lee, SJ Stolfo
ACM transactions on Information and system security (TiSSEC) 3 (4), 227-261, 2000
12962000
AdaCost: misclassification cost-sensitive boosting
W Fan, SJ Stolfo, J Zhang, PK Chan
Icml 99, 97-105, 1999
9981999
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
SJ Stolfo, W Fan, W Lee, A Prodromidis, PK Chan
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
8752000
Method and system for using intelligent agents for financial transactions, services, accounting, and advice
D Schutzer, WH Forster Jr, H Hu, W Lee, SJ Stolfo, W Fan
US Patent 5,920,848, 1999
7781999
Adaptive intrusion detection: A data mining approach
W Lee, SJ Stolfo, KW Mok
Artificial Intelligence Review 14, 533-567, 2000
5872000
On the feasibility of online malware detection with performance counters
J Demme, M Maycock, J Schmitz, A Tang, A Waksman, S Sethumadhavan, ...
ACM SIGARCH computer architecture news 41 (3), 559-570, 2013
5772013
Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party
SJ Stolfo, Y Yemini, LP Shaykin
US Patent 7,069,249, 2006
5712006
Learning patterns from unix process execution traces for intrusion detection
W Lee, SJ Stolfo, PK Chan
AAAI workshop on AI approaches to fraud detection and risk management, 50-56, 1997
5291997
JAM: Java Agents for Meta-Learning over Distributed Databases.
SJ Stolfo, AL Prodromidis, S Tselepis, W Lee, DW Fan, PK Chan
KDD 97, 74-81, 1997
5041997
Anagram: A content anomaly detector resistant to mimicry attack
K Wang, JJ Parekh, SJ Stolfo
International workshop on recent advances in intrusion detection, 226-248, 2006
4852006
Method and apparatus for imaging, image processing and data compression
SJ Stolfo
US Patent 5,748,780, 1998
4851998
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis, S Sidiroglou, SJ Stolfo, ...
US Patent 8,528,091, 2013
4752013
The system can't perform the operation now. Try again later.
Articles 1–20